deep packet injection addition of data into an internet stream (the NSA and GCHQ are alleged to do it to send code to targets’ computers that causes them to be infected with spyware as part of an operation codenamed QuantumInsert)

deep packet inspection communications surveillance tools that are able to monitor the traffic of network data that is sent over the Internet at all seven layers of the OSI Reference Model of Internet communication, which includes the surveillance of content data

Dial Number Recognition NSA term for content sent across the internet

digital footprint compilation of content on the Internet that can be associated with a person and, thus, potentially available to anyone performing a search on that person

duty of secrecy duty of a professional not to disclose confidential information about another party to others

echelon interception system global network of electronic spy stations that can eavesdrop on telephones, faxes and computers

encryption reversible logical or numerical operation designed to hide the information contained in the file so that it can be extracted only by those who have the key

Five Eyes, UKUSA post-war secret intelligence partnership between the US and UK as “first” parties, Canada/Australia/New Zealand as second parties, and other nations

full take tapping into internet backbone cables and collecting all the traffic for a certain period of time

hop degree of separation along a chain of contacts

humint NSA term for information gathered from people rather than machines

Intelligence and Security Committee of Parliament, ISC established by the Intelligence Services Act 1994 to examine the policy, administration and expenditure of the UK’s Security Service, Secret Intelligence Service (SIS), and the Government Communications Headquarters (GCHQ)

Keyhole generic code name for US remote-sensing satellites within the US strategic air force

link analysis in network theory, link analysis is a data-analysis technique used to evaluate relationships (connections) between nodes (has been used for investigation of criminal activity, computer security analysis, search engine optimization, market research and medical research)

metadata data that defines and describes other data

Office of the Director of National Intelligence, ODNI head of the US intelligence community, in charge of 17 organisations and agencies including the NSA, FBI and CIA

originator control access control policy that requires recipients to gain originator’s approval for re-dissemination of disseminated digital object

PRISM programme surveillance system launched in 2007 by the US National Security Agency which allows the organisation to “receive” emails, video clips, photos, voice and video calls, social networking details, logins and other data held by a range of US internet firms

probable cause in the US, reasonable basis for believing that a crime may have been committed (for arrest) and that evidence of the crime is present in the place to be searched (for search)

reasonable suspicion in the US, standard used in criminal procedure, more relaxed than probable cause, that can justify less-intrusive searches

third party rule any received/shared intelligence cannot be shared with any other service or country

Tshwane principles, Global Principles on National Security and the Right to Information principles providing guidance to those engaged in drafting, revising, or implementing laws or provisions relating to the state’s authority to withhold information on national security grounds or to punish the disclosure of such information